Sciweavers

10285 search results - page 2022 / 2057
» Composing Feature Models
Sort
View
DIMVA
2008
15 years 3 months ago
Embedded Malware Detection Using Markov n-Grams
Embedded malware is a recently discovered security threat that allows malcode to be hidden inside a benign file. It has been shown that embedded malware is not detected by commerci...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
ICONIP
2007
15 years 3 months ago
Using Generalization Error Bounds to Train the Set Covering Machine
In this paper we eliminate the need for parameter estimation associated with the set covering machine (SCM) by directly minimizing generalization error bounds. Firstly, we consider...
Zakria Hussain, John Shawe-Taylor
IFIP8
2007
15 years 3 months ago
Grid-VirtuE: A Layered Architecture for Grid Virtual Enterprises
A grid virtual enterprise is a community of independent enterprises concerned with a particular sector of the economy. Its members (nodes) are small or medium size enterprises (SME...
Alfredo Cuzzocrea, Alessandro D'Atri, Andrea Gualt...
ACE
2004
193views Education» more  ACE 2004»
15 years 3 months ago
Conversational KM - Student Driven Learning
A conversational method of teaching whereby the students engage each other as a key part of the learning experience achieves a higher percentage of high grades (and presumably bet...
Marilyn A. Wells, Phillip W. Brook
AAAI
2006
15 years 3 months ago
Decision Making in Uncertain Real-World Domains Using DT-Golog
DTGolog, a decision-theoretic agent programming language based on the situation calculus, was proposed to ease some of the computational difficulties associated with Markov Decisi...
Mikhail Soutchanski, Huy Pham, John Mylopoulos
« Prev « First page 2022 / 2057 Last » Next »